Perfect Passwords: Selection, Protection, Authentication
Format: PDF / Kindle (mobi) / ePub
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements.
A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember.
* Examines the password problem from the perspective of the administrator trying to secure their network
* Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot
* Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords
three properties deem random data impossible to guess, therefore making randomness a vital element for strong passwords. Unfortunately, completely random passwords are very difficult to remember and even if we could remember them, creating them would be a complicated task. Even Distribution Even distribution means that before producing a random sequence of data, there is an equal probability of all possible outcomes. Before you roll a dice, there is an equal chance of landing on any one
rock. Every gesture chosen has an equal chance of winning, losing, or drawing an opponent’s gesture. RPS is a fascinating study of randomness, because rounds of RPS are basically series of random combinations. It has long been considered a fair method of selection or elimination. At first glance, the results of any RPS round seem quite random and should even out over time, just like a coin toss or rolling dice. There are three choices for each player and each player has the opportunity to
nearby isn’t much better. Once someone discovers your hiding place, all security is lost. Therefore, security through obscurity is widely considered a weak form of security. In contrast, the opposite of this is how a realtor might place a house key in a lock box attached to your doorknob. Anyone with the box’s combination can obtain the key to open the door. This allows various realtors to show the house without having to copy and pass around keys. The combination on the lock box is an example
do this when you save the document (see Figure 7.3). Figure 7.3 Adding Password Protection to an Excel File From there, set a Password to open and click on the Advanced button to select more encryption options (see Figure 7.4). Figure 7.4 Encryption Options Never use “Weak Encryption (XOR)” or “Office 97/2000-Compatible” encryption because they provide little protection, and both can be broken in just a few minutes or less. They are somewhat similar to the tiny locks some
this technique is that as computing power increases, it would not be difficult for a hacker to try every combination of two words to discover the password. Even current technology makes that feasible. This password technique is similar to the two-words method. The difference is that it takes it one step further by swapping the first one or two letters of each word to make it less likely they will appear on a dictionary or common password list. These types of words are called spoonerisms. This